暂无分享,去创建一个
[1] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[2] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[3] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[4] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[5] Yujia Liu,et al. A Geometry-Inspired Decision-Based Attack , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[6] Heidi A. Peterson,et al. Luminance-model-based DCT quantization for color image compression , 1992, Electronic Imaging.
[7] Marcus A. Brubaker,et al. On the Effectiveness of Low Frequency Perturbations , 2019, IJCAI.
[8] Mingyan Liu,et al. Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation , 2018, ECCV.
[9] Seyed-Mohsen Moosavi-Dezfooli,et al. SparseFool: A Few Pixels Make a Big Difference , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[10] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[11] Isay Katsman,et al. Generative Adversarial Perturbations , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[12] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[13] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[14] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[15] Kilian Q. Weinberger,et al. Low Frequency Adversarial Perturbation , 2018, UAI.
[16] R. Venkatesh Babu,et al. Fast Feature Fool: A data independent approach to universal adversarial perturbations , 2017, BMVC.
[17] Lina J. Karam,et al. Adaptive image coding with perceptual distortion control , 2002, IEEE Trans. Image Process..
[18] Alan L. Yuille,et al. Adversarial Examples for Semantic Segmentation and Object Detection , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[19] Zoran A. Ivanovski,et al. An Efficient Selective Perceptual-Based Super-Resolution Estimator , 2011, IEEE Transactions on Image Processing.
[20] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[21] Hyun Oh Song,et al. Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization , 2019, ICML.
[22] Thomas Brox,et al. Defending Against Universal Perturbations With Shared Adversarial Training , 2018, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[23] Tong Zhang,et al. NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks , 2019, ICML.
[24] Felix Heide,et al. Defending Against Universal Attacks Through Selective Feature Regeneration , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[25] R. Venkatesh Babu,et al. Generalizable Data-Free Objective for Crafting Universal Adversarial Perturbations , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[26] Larry S. Davis,et al. Universal Adversarial Training , 2018, AAAI.
[27] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[28] Eric P. Xing,et al. High-Frequency Component Helps Explain the Generalization of Convolutional Neural Networks , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[29] R. Venkatesh Babu,et al. NAG: Network for Adversary Generation , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[30] Arun Balaji Buduru,et al. A Survey of Black-Box Adversarial Attacks on Computer Vision Models , 2019 .
[31] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[32] Andrew Gordon Wilson,et al. Simple Black-box Adversarial Attacks , 2019, ICML.
[33] Jinfeng Yi,et al. ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models , 2017, AISec@CCS.
[34] Dawn Xiaodong Song,et al. Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms , 2018, ECCV.
[35] Zhen Liu,et al. JPEG2000 encoding with perceptual distortion control , 2006, IEEE Transactions on Image Processing.